CIA NSA

Creepy details about how the NSA automatically "plants" malware

Glenn's Intercept website and Ryan Gallagher released more information from the files leaked by Edward Snowden from the US National Security Agency (NSA). The publication presents them that allow US intelligence to make automated exploits on vulnerabilities in industry networks and systems.

hammer-vpn

It turns out that NSA has automated processes at its disposal that allow it to plant malware on computers around the world. The documents provided by Snowden show that the British intelligence agency GCHQ has played a significant role in the development of these systems.

NSA tactics are similar to those used by cyber criminals. In some cases, they had created a fake Facebook server and used the social networking site to distribute malicious software. Of course, this whole process was done to steal data from infected computers.

The secret service has also carried out many spam campaigns to distribute malicious software capable of recording audio and capturing photos through the computer camera.

2004 had about 100-150 malware. However, after the creation of Tailored Access Operations (TAO) and recruiting hackers, new tools have been developed. So the number of malware today reaches tens of thousands.

Δεδομένου ότι είναι αδύνατο να διαχειριστούν τα malware με αυτόματο τρόπο, η NSA έχει αναπτύξει ένα λογισμικό που ονομάζεται TURBINE. Αυτό το σύστημα είναι ικανό να διαχειρίζεται ενεργά malware, που επιτρέπουν στον οργανισμό να διεξάγει exploit σε βιο κλίμακα.

TURBINE is said to be part of a wider surveillance initiative that the NSA has dubbed "Owning the Net" or in free translation "making the net our own." And if you are wondering how much money is being spent on these projects, the NSA asked for $ 67.600.000 million last year.
There is a wide range of malicious tools used by the NSA. For example, UNITEDRAKE is used to gain full control over the device.
UNITEDRAKE is a series of plug-ins, each designed for a specific purpose.
CAPTIVATEDAUDIENCE is for recording conversations through the computer's microphone, GUMFISH is to take advantage of the camera, FOGGYBOTTOM for Internet data leakage (such as browsing history and passwords), and Grok copies and saves everything typing the victim on his keyboard.

And if you think encryption tools can protect you from such malicious software, you are wrong. All of the above tools are designed to circumvent these protections as the information they collect has not been able to be encrypted.

All of the Edward Snowden records that prove the above are available at Intercept.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.091 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).